Deployment Guide
Table Of Contents
- Dell Encryption Personal Installation Guide v11.0
- Contents
- Overview
- Requirements
- Download the Software
- Installation
- Advanced Authentication and Encryption Personal Setup Wizards
- Configure Console Settings
- Uninstall the Master Installer
- Uninstall Using the Child Installers
- Data Security Uninstaller
- Policies and Template Descriptions
- Policies
- Template Descriptions
- Aggressive Protection for All Fixed Drives and External Drives
- PCI Regulation Targeted
- Data Breach Regulation Targeted
- HIPAA Regulation Targeted
- Basic Protection for All Fixed Drives and External Drives (Default)
- Basic Protection for All Fixed Drives
- Basic Protection for System Drive Only
- Basic Protection for External Drives
- Encryption Disabled
- Extract Child Installers
- Troubleshooting
- Glossary
Policy Aggre
ssive
Protec
tion
for All
Fixed
Drives
and
Extern
al
Drives
PCI
Regula
tion
Data
Breac
h
Regula
tion
HIPAA
Regula
tion
Basic
Protec
tion
for All
Fixed
Drives
and
Ext
Drives
(Defau
lt)
Basic
Protec
tion
for All
Fixed
Drives
Basic
Protec
tion
for
Syste
m
Drive
Only
Basic
Protec
tion
for
Extern
al
Drives
Encry
ption
Disabl
ed
Description
Secure
Post-
Encryptio
n Cleanup
Three
Pass
Overwr
ite
Single Pass Overwrite No
Overwr
ite
No Overwrite, Single-pass
Overwrite, Three-pass
Overwrite, Seven-pass
Overwrite
Once folders specified
via other policies in
this category have been
encrypted, this policy
determines what happens
to the unencrypted residue
of the original files:
• No Overwrite deletes
it. This value yields
the fastest encryption
processing.
• Single-pass Overwrite
overwrites it with random
data.
• Three-pass Overwrite
overwrites it with a
standard pattern of 1s
and 0s, then with its
complement, and then with
random data.
• Seven-pass Overwrite
overwrites it with a
standard pattern of 1s
and 0s, then with its
complement, and then with
random data five times.
This value makes it most
difficult to recover the
original files from memory,
and yields the most secure
encryption processing.
Secure
Windows
Hibernatio
n File
True False True False When enabled, the
hibernation file is
encrypted only when
the computer enters
hibernation. The client
disengages protection
when the computer
comes out of hibernation,
providing protection
without impacting users
or applications while the
computer is in use.
48 Policies and Template Descriptions